A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position

Abstract Vehicle ad hoc networks (VANETs) have attracted great interests from both industry and academia, but a number of issues, particularly security, have not been readily addressed. Intrusion Detection System (IDS) as one of the most important approaches to protect network security has been studied adequately in previous literatures. However, the performance of IDSs still needs to be improved to adapt the scenario of VANETs which are very fast moving and highly dynamic. In this paper, we propose a novel IDS that is able to be appropriately used in the wireless and dynamic networks, like VANETs. It mainly contains a novel feature extraction algorithm and a classifier based on an improved growing hierarchical self-organizing map (I-GHSOM) for IDS in VANETs. The proposed feature extraction algorithm is used to quickly extract distinct features from vehicle messages for IDS’s training and test. In the proposed algorithm, two key features including the differences of traffic flow and of position are extracted. The former feature is calculated according to the range of the distance between vehicles, while both a voting filter mechanism and a semi-cooperative mechanism are designed to get the latter feature. Furthermore, in the I-GHSOM-based classifier, for quickly attaining precise classification results, two novel mechanisms (relabeling and recalculating mechanisms) are proposed to relabel the units of GHSOM and check whether the balance of GHSOM structure is broken or not. Simulation results show that the proposed IDS is better than others in the measurement of accuracy, stability, processing efficiency and message scales.

[1]  Zhong Ming,et al.  An improved NSGA-III algorithm for feature selection used in intrusion detection , 2017, Knowl. Based Syst..

[2]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[3]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[4]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[5]  Victor I. Chang,et al.  Big data analytics for mitigating broadcast storm in Vehicular Content Centric networks , 2017, Future Gener. Comput. Syst..

[6]  Shi-Jinn Horng,et al.  Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.

[7]  Dijiang Huang,et al.  Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs , 2016, IEEE Trans. Dependable Secur. Comput..

[8]  Shihao Yan,et al.  Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.

[9]  Mohsen Guizani,et al.  A lightweight privacy-preserving protocol using chameleon hashing for secure vehicular communications , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[10]  Vijay Varadharajan,et al.  Intrusion detection techniques in cloud environment: A survey , 2017, J. Netw. Comput. Appl..

[11]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[12]  Sami Muhaidat,et al.  Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[13]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[14]  Pietro Manzoni,et al.  Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs , 2010, 2010 IEEE International Conference on Communications Workshops.

[15]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[16]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[17]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[18]  Sidi-Mohammed Senouci,et al.  A distributed detection and prevention scheme from malicious nodes in vehicular networks , 2016, Int. J. Commun. Syst..

[19]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[20]  Chinnappan Jayakumar,et al.  Trust based authentication technique for cluster based vehicular ad hoc networks (VANET) , 2018, Wirel. Networks.

[21]  Sidi-Mohammed Senouci,et al.  Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.

[22]  Klaus D. McDonald-Maier,et al.  On the detection of grey hole and rushing attacks in self-driving vehicular networks , 2015, 2015 7th Computer Science and Electronic Engineering Conference (CEEC).

[23]  Andreas Rauber,et al.  The growing hierarchical self-organizing map: exploratory analysis of high-dimensional data , 2002, IEEE Trans. Neural Networks.

[24]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[25]  Nirbhay Chaubey,et al.  Security Analysis of Vehicular Ad Hoc Networks (VANETs): A Comprehensive Study , 2016 .

[26]  Jamal Bentahar,et al.  CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..

[27]  Jalel Ben-Othman,et al.  DJAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks , 2015, Perform. Evaluation.

[28]  Hao Hu,et al.  REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET , 2017, IEEE Transactions on Vehicular Technology.

[29]  Hassan Artail,et al.  A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks , 2013, IEEE Transactions on Vehicular Technology.

[30]  Teuvo Kohonen,et al.  The self-organizing map , 1990, Neurocomputing.

[31]  Sherali Zeadally,et al.  Trust-based security adaptation mechanism for Vehicular Sensor Networks , 2018, Comput. Networks.

[32]  Sushanta Karmakar,et al.  A game theory based multi layered intrusion detection framework for VANET , 2018, Future Gener. Comput. Syst..

[33]  Antonino Staiano,et al.  Machine learning and soft computing for ICT security: an overview of current trends , 2011, Journal of Ambient Intelligence and Humanized Computing.

[34]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[35]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[36]  Nirwan Ansari,et al.  Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.

[37]  Ajay Kaul,et al.  Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..